Libextractor Multiple Heap Buffer Overflow Vulnerabilities

BID:18021

CVE-2006-2458 |

Info

Libextractor Multiple Heap Buffer Overflow Vulnerabilities

Bugtraq ID: 18021
Class: Boundary Condition Error
CVE: CVE-2006-2458
Remote: Yes
Local: No
Published: May 17 2006 12:00AM
Updated: Nov 28 2006 08:20PM
Credit: Luigi Auriemma <[email protected]> discovered these vulnerabilities.
Vulnerable: S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 10.1
libextractor libextractor 0.5.13
Gentoo Linux
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Not Vulnerable: libextractor libextractor 0.5.14

Discussion

Libextractor Multiple Heap Buffer Overflow Vulnerabilities

The libextractor library is affected by multiple buffer-overflow vulnerabilities. The software fails to perform sufficient boundary checks of user-supplied input before copying it to insufficiently sized memory buffers.

An attacker exploits these issues by enticing a vulnerable user to open a malformed file using an application that employs libextractor.

This issue allows attackers to execute arbitrary machine code in the context of applications that use the affected library, aiding them in the remote compromise of affected computers.

Version 0.5.13 of libextractor is vulnerable to these issues; other versions may also be affected.

Exploit / POC

Libextractor Multiple Heap Buffer Overflow Vulnerabilities

The following proof-of-concept exploit code is available:

Solution / Fix

Libextractor Multiple Heap Buffer Overflow Vulnerabilities

Solution:
The vendor has released libextractor 0.5.14 to address these issues.

Please see the referenced vendor advisories for further information.


libextractor libextractor 0.5.13

References

Libextractor Multiple Heap Buffer Overflow Vulnerabilities

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report